Sciweavers

1479 search results - page 242 / 296
» Management without (Detailed) Models
Sort
View
MABS
2007
Springer
15 years 11 months ago
Beyond Accuracy. Reputation for Partner Selection with Lies and Retaliation
In an unpredictable, heterogeneous world, intelligent agents depend on accurate social information; reputation, among the preeminent artifacts to transmit social evaluations, has b...
Isaac Pinyol, Mario Paolucci, Jordi Sabater-Mir, R...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 11 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
CCGRID
2006
IEEE
15 years 11 months ago
Exploit Failure Prediction for Adaptive Fault-Tolerance in Cluster Computing
As the scale of cluster computing grows, it is becoming hard for long-running applications to complete without facing failures on large-scale clusters. To address this issue, chec...
Yawei Li, Zhiling Lan
DSN
2006
IEEE
15 years 11 months ago
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults
The Solaris 10 Operating System includes a number of new features for predictive self-healing. One such feature is the ability of the Fault Management software to diagnose memory ...
Dong Tang, Peter Carruthers, Zuheir Totari, Michae...
IEEESCC
2006
IEEE
15 years 11 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan